Unlock instant, AI-driven research and patent intelligence for your innovation.

Authentication method, device and system

An authentication method and technology for a communication system, applied in the field of equipment and systems, and authentication methods, can solve problems such as being unable to support data communication of IoT devices, affecting the service life of IoT devices, and small batteries.

Active Publication Date: 2021-03-05
HUAWEI TECH CO LTD
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, the power storage capacity of IoT devices is generally weak, and frequent data communication through the Internet will consume a large amount of power of IoT devices and affect the service life of IoT devices
Especially for IoT devices with relatively small size, the batteries are usually made too small to support IoT devices for long-term data communication

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication method, device and system
  • Authentication method, device and system
  • Authentication method, device and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0086] The embodiments of the present application will be described in detail below in conjunction with the accompanying drawings and specific implementation manners.

[0087] In order to facilitate the understanding of the embodiments of the present application, the trusted domain is firstly introduced below. The characteristics of a trusted domain are: in the same trusted domain, nodes trust each other, that is, in the same trusted domain, nodes can access each other without mutual authentication. The trusted domain can be established according to the social relationship of the nodes, wherein the social relationship can be a property relationship, for example, personal notebooks, refrigerators, TVs, electric meters, water meters, etc. are nodes belonging to the same user, which can constitute a trusted area. The social relationship can be the relationship between things in the same area, for example, temperature sensors, humidity sensors, smoke sensors, and fire-fighting eq...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Embodiments of the present application provide an authentication method, device, and system. The method includes: when the access node needs to visit the target slave node in the target trusted domain, the source master node sends an identity query request to the identity management system; the source master node receives the identity query result returned by the identity management system, and the identity query The result is used to indicate that the attribute of the destination slave node is a slave node, and the master node corresponding to the destination slave node is the destination master node; the source master node sends a location query request to the identity and location mapping management device; the source master node receives the identity and location mapping management device The returned location query result, the location query result includes the global positioning address of the destination master node; the source master node sends the first destination signature message to the destination master node based on the global location address of the destination master node; the source master node receives the first destination master node sent by the destination master node A verification result, the first verification result is used to indicate that the destination slave node has passed the identity authentication of the access node.

Description

technical field [0001] The present invention relates to the communication field, in particular to an authentication method, device and system. Background technique [0002] Nowadays, Internet of Things (IOT) devices have been widely used in environmental detection, health care, smart home, logistics tracking, etc., which greatly facilitate people's lives. IoT devices can directly communicate with the Internet, and use the data transmission services provided by the Internet to present a rich application experience for users. [0003] However, the power storage capacity of IoT devices is generally weak, and frequent data communication through the Internet will consume a large amount of power of IoT devices and affect the service life of IoT devices. Especially for IoT devices with a relatively small size, the battery is usually made too small to support the IoT device for long-term data communication. Contents of the invention [0004] The embodiments of the present applic...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/08H04L63/0807H04L63/0876H04L9/32H04W12/06G06F21/44G06F21/45G06F21/74H04L9/40
Inventor 王东晖笪斌李金明
Owner HUAWEI TECH CO LTD